Analysis
-
max time kernel
137s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 03:54
Static task
static1
Behavioral task
behavioral1
Sample
7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe
Resource
win7-20240903-en
General
-
Target
7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe
-
Size
491KB
-
MD5
d4a3ce48cefcad6ef68222189195adb5
-
SHA1
fba76b5c3190e8cca9ce9c42620195fe9ba0e30d
-
SHA256
7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683
-
SHA512
e3fd2fc09dc3f33bfb4f1a76010b4fc79d880acd6ca701a2d10f4fe36f4289450f49b78bb012ddc9331772207b5c759192396811e4e3b3ffb61e2a4c72caedb7
-
SSDEEP
6144:GpoMkequERu8qQ1fjYMMW9eKZH+IdISTUL24qL9cPKcPzR2Re6lZv:oDR+u8pfjYMMWNvdhUSByFPzAv
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2364-6-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral1/memory/2364-5-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral1/memory/2364-3-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral1/memory/2364-2-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral1/memory/2768-14-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral1/memory/2768-16-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral1/memory/2768-20-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral1/memory/2812-24-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral1/memory/2812-27-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral1/memory/2812-26-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral1/memory/2812-23-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 11 IoCs
resource yara_rule behavioral1/memory/2364-6-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral1/memory/2364-5-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral1/memory/2364-3-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral1/memory/2364-2-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral1/memory/2768-14-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral1/memory/2768-16-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral1/memory/2768-20-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral1/memory/2812-24-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral1/memory/2812-27-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral1/memory/2812-26-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral1/memory/2812-23-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat -
Gh0strat family
-
Purplefox family
-
Deletes itself 1 IoCs
pid Process 2796 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2768 Deuvw.exe 2812 Deuvw.exe -
Loads dropped DLL 1 IoCs
pid Process 2768 Deuvw.exe -
resource yara_rule behavioral1/memory/2364-0-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral1/memory/2364-6-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral1/memory/2364-5-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral1/memory/2364-3-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral1/memory/2364-2-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral1/memory/2768-14-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral1/memory/2768-16-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral1/memory/2768-20-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral1/memory/2812-24-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral1/memory/2812-27-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral1/memory/2812-26-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral1/memory/2812-23-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral1/memory/2812-21-0x0000000010000000-0x00000000101D0000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Deuvw.exe 7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe File opened for modification C:\Program Files\Deuvw.exe 7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Deuvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Deuvw.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2608 PING.EXE 2796 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2608 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2364 7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2768 wrote to memory of 2812 2768 Deuvw.exe 31 PID 2768 wrote to memory of 2812 2768 Deuvw.exe 31 PID 2768 wrote to memory of 2812 2768 Deuvw.exe 31 PID 2768 wrote to memory of 2812 2768 Deuvw.exe 31 PID 2364 wrote to memory of 2796 2364 7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe 32 PID 2364 wrote to memory of 2796 2364 7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe 32 PID 2364 wrote to memory of 2796 2364 7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe 32 PID 2364 wrote to memory of 2796 2364 7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe 32 PID 2796 wrote to memory of 2608 2796 cmd.exe 34 PID 2796 wrote to memory of 2608 2796 cmd.exe 34 PID 2796 wrote to memory of 2608 2796 cmd.exe 34 PID 2796 wrote to memory of 2608 2796 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe"C:\Users\Admin\AppData\Local\Temp\7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\7D6057~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2608
-
-
-
C:\Program Files\Deuvw.exe"C:\\Program Files\\Deuvw.exe" -auto1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Program Files\Deuvw.exe"C:\Program Files\Deuvw.exe" -acsi2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
491KB
MD5d4a3ce48cefcad6ef68222189195adb5
SHA1fba76b5c3190e8cca9ce9c42620195fe9ba0e30d
SHA2567d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683
SHA512e3fd2fc09dc3f33bfb4f1a76010b4fc79d880acd6ca701a2d10f4fe36f4289450f49b78bb012ddc9331772207b5c759192396811e4e3b3ffb61e2a4c72caedb7